"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-09-10 21:00:51 +00:00
parent acb1b04fde
commit 77c976f084
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
22 changed files with 325 additions and 18 deletions

View File

@ -117,6 +117,16 @@
"refsource": "MLIST",
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html",
"url": "https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html"
}
]
}

View File

@ -222,6 +222,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154406/Tibco-JasperSoft-Path-Traversal.html",
"url": "http://packetstormsecurity.com/files/154406/Tibco-JasperSoft-Path-Traversal.html"
},
{
"refsource": "MISC",
"name": "https://security.elarlang.eu/cve-2018-18809-path-traversal-in-tibco-jaspersoft.html",
"url": "https://security.elarlang.eu/cve-2018-18809-path-traversal-in-tibco-jaspersoft.html"
}
]
},

View File

@ -104,6 +104,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190813 [SECURITY] [DLA 1883-1] tomcat8 security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4128-1",
"url": "https://usn.ubuntu.com/4128-1/"
}
]
},

View File

@ -68,6 +68,11 @@
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K17321505",
"url": "https://support.f5.com/csp/article/K17321505"
},
{
"refsource": "UBUNTU",
"name": "USN-4128-1",
"url": "https://usn.ubuntu.com/4128-1/"
}
]
},

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11668",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@suse.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Service Manager, Service Manager \u2013 Chat Service. Server Manager \u2013 Chat Service.",
"version": {
"version_data": [
{
"version_value": "Service manager, Versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. Service Manager Chat Server, versions 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. Service Manager Chat Service 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62."
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "HTTP cookie"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://softwaresupport.softwaregrp.com/doc/KM03517335",
"url": "https://softwaresupport.softwaregrp.com/doc/KM03517335"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "HTTP cookie in Micro Focus Service manager, Versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. And Micro Focus Service Manager Chat Server, versions 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. And Micro Focus Service Manager Chat Service 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62."
}
]
}

View File

@ -4,14 +4,64 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11669",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@suse.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Micro Focus",
"product": {
"product_data": [
{
"product_name": "Service Manager",
"version": {
"version_data": [
{
"version_value": "9.60p1"
},
{
"version_value": "9.61"
},
{
"version_value": "9.62"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Modifiable read only check box in FF"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://softwaresupport.softwaregrp.com/doc/KM03517334",
"url": "https://softwaresupport.softwaregrp.com/doc/KM03517334"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Modifiable read only check box In Micro Focus Service Manager, versions 9.60p1, 9.61, 9.62. This vulnerability could be exploited to allow unauthorized modification of data."
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2070",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2070",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2070",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2070",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2070",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2068",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00013.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2110",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00028.html"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-12942",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-12942",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "TTLock devices do not properly block guest access in certain situations where the network connection to the cloud is unavailable."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.kth.se/polopoly_fs/1.923565.1568098364!/Vulnerability_Report_TTLock_State_Consistency.pdf",
"url": "https://www.kth.se/polopoly_fs/1.923565.1568098364!/Vulnerability_Report_TTLock_State_Consistency.pdf"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-12943",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-12943",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "TTLock devices do not properly restrict password-reset attempts, leading to incorrect access control and disclosure of sensitive information about valid account names."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.kth.se/polopoly_fs/1.923564.1568098316!/Vulnerability_Report_TTLock_Password_Reset.pdf",
"url": "https://www.kth.se/polopoly_fs/1.923564.1568098316!/Vulnerability_Report_TTLock_Password_Reset.pdf"
}
]
}

View File

@ -76,6 +76,16 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-446ca9f695",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UITVW4WTOOCECLLWPQCV7VWMU66DN255/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2109",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html"
}
]
}

View File

@ -58,6 +58,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2070",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html"
}
]
},

View File

@ -68,6 +68,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2071",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2109",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html"
}
]
},

View File

@ -58,6 +58,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2071",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2109",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html"
}
]
},

View File

@ -58,6 +58,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2071",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2109",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html"
}
]
},

View File

@ -58,6 +58,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2071",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2109",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html"
}
]
},

View File

@ -58,6 +58,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2071",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2109",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html"
}
]
},

View File

@ -106,6 +106,11 @@
"refsource": "GENTOO",
"name": "GLSA-201909-07",
"url": "https://security.gentoo.org/glsa/201909-07"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2109",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html"
}
]
}